An Entropy-Based Upper Bound Methodology for ... - Semantic Scholar

2 downloads 0 Views 489KB Size Report
Sep 22, 2014 - every time we execute a project we have to deal with uncertainty; part of it ..... duration, Bushuyev and Sochnev [106] used Shannon's formula.
Entropy 2014, 16, 5032-5067; doi:10.3390/e16095032 OPEN ACCESS

entropy ISSN 1099-4300 www.mdpi.com/journal/entropy Article

An Entropy-Based Upper Bound Methodology for Robust Predictive Multi-Mode RCPSP Schedules Angela Hsiang-Ling Chen 1,*, Yun-Chia Liang 2,3 and Jose David Padilla 2 1

2

3

Department of Marketing and Distribution Management, Taoyuan Innovation Institute of Technology, Chungli, Taoyuan County 32003, Taiwan Department of Industrial Engineering and Management, Yuan Ze University, Chungli, Taoyuan County 32003, Taiwan; E-Mails: [email protected] (Y-C.L.); [email protected] (J.D.P.) Innovation Center for Big Data and Digital Convergence, Yuan Ze University, Chungli, Taoyuan County 32003, Taiwan

* Author to whom correspondence should be addressed; E-Mail: [email protected]; Tel.: +886-3-436-1070 (ext. 5510); Fax: +886-3-437-8240. Received: 21 April 2014; in revised form: 7 July 2014 / Accepted: 25 August 2014 / Published: 22 September 2014

Abstract: Projects are an important part of our activities and regardless of their magnitude, scheduling is at the very core of every project. In an ideal world makespan minimization, which is the most commonly sought objective, would give us an advantage. However, every time we execute a project we have to deal with uncertainty; part of it coming from known sources and part remaining unknown until it affects us. For this reason, it is much more practical to focus on making our schedules robust, capable of handling uncertainty, and even to determine a range in which the project could be completed. In this paper we focus on an approach to determine such a range for the Multi-mode Resource Constrained Project Scheduling Problem (MRCPSP), a widely researched, NP-complete problem, but without adding any subjective considerations to its estimation. We do this by using a concept well known in the domain of thermodynamics, entropy and a three-stage approach. First we use Artificial Bee Colony (ABC)—an effective and powerful meta-heuristic—to determine a schedule with minimized makespan which serves as a lower bound. The second stage defines buffer times and creates an upper bound makespan using an entropy function, with the advantage over other methods that it only considers elements which are inherent to the schedule itself and does not introduce any subjectivity to the buffer time generation. In the last stage, we use the ABC algorithm with an objective function that seeks to maximize robustness while staying within the makespan boundaries defined

Entropy 2014, 16

5033

previously and in some cases even below the lower boundary. We evaluate our approach with two different benchmarks sets: when using the PSPLIB for the MRCPSP benchmark set, the computational results indicate that it is possible to generate robust schedules which generally result in an increase of less than 10% of the best known solutions while increasing the robustness in at least 20% for practically every benchmark set. And, in an attempt to solve larger instances with 50 or 100 activities, we also used the MRCPSP/max benchmark sets, where the increase of the makespan is approximately 35% with respect to the best known solutions at the same time as with a 20% increase in robustness. Keywords: MRCPSP; ABC; entropy; robust schedule

1. Introduction Projects are an important part of our activities and regardless of their magnitude, scheduling is at the very core of every project. One of the most commonly sought objectives when scheduling projects is completing them on the shortest possible time considering both urgency and resource availability; and even though we might be aware of some of the risks that could affect our planned (baseline) schedule, there will always be a certain degree of uncertainty that will remain unaccounted for. A formal and commonly accepted definition for project is: “a temporary organization to which resources are assigned to undertake a unique, novel and transient endeavor managing the inherent uncertainty and need for integration in order to deliver beneficial objectives of change” [1–3]. From this definition we notice that uncertainty is given and if we want to successfully complete our project we need to manage it. In practice, a rather common way to manage uncertainty is by adding a buffer time that consists basically of a percentage of the total estimated duration. This is a fast and easy way to account for unforeseen events but it is entirely subjective as it depends almost exclusively on the experience or inexperience of the scheduler. Besides, the scheduler has already included his personal judgment when estimating each activity’s duration. Including a subjective buffer time could be dangerously over or even underestimate both the schedule’s duration and its budget. In this paper we approach buffer time generation borrowing a term from the field of thermodynamics, entropy. Our methodology estimates an upper bound for a project’s makespan that depends exclusively on the activity’s estimated duration and the precedence requirements. After the upper bound is generated we use a quality based robustness measure to generate schedules with maximized robustness and with a makespan that is at most (but not necessarily) as high as the upper bound (entropy containing) schedule. By using the concept of entropy we eliminate the subjectivity in buffer time generation, and provide an equally convenient procedure to account for uncertainty. The remainder of this paper is outlined as follows: Section 2 provides some background regarding the project scheduling problem, the way in which uncertainty has been handled in project scheduling, and the concept of robustness in scheduling. Section 3 describes the algorithm and the 3-stage methodology to generate schedules with maximized robustness and an entropy-based upper bound. Section 4 reports the computational results of the methodology when compared to the PSPLIB and MRCPSP/max benchmark instances. Finally, Section 5 presents the conclusions and future research directions.

Entropy 2014, 16

5034

2. Literature Review 2.1. Resource Constrained Project Scheduling Problem In general, a project consists of a set of tasks, governed by precedence relationships. Usually, the objective of interest is to complete the project in the shortest possible time while obeying the established precedence. Project scheduling is less difficult when only precedence relations constrain the task scheduling and can be easily solved using techniques like Critical Path Method (CPM) and Program Evaluation and Review Technique (PERT). However, in most real situations, executing a task requires resources, which are generally available in limited amounts and this makes the project scheduling problem very difficult to solve optimally. When resources are constrained and each task can be executed in only one way, the scheduling problem is known as the Resource Constrained Project Scheduling Problem (RCPSP). The RCPSP has been studied by many authors and is known to be NP-Hard [4]. However, a more realistic situation is that in which each task can be completed in one out of several possible alternatives. Each alternative preferably leads to a different duration, and potentially requires either different resources and/or amount of resources. This problem, known as the multi-mode resource-constrained project scheduling problem (MRCPSP), is a generalization of the RCPSP. Kolisch [5] proved the NP-hardness of the MRCPSP as a generalization of the RCPSP. 2.1.1. Multi-mode Resource Constrained Project Scheduling Problem The main difference between the single and multi-mode RCPSP are the amount of modes or ways in which an activity can be executed. Elmaghraby [6] introduced the concept of mode, which resembles real life project management where each activity can be done in one out of several alternatives. Each mode is characterized by its own duration, and they depend on the amount of resources they consume. This means that the project manager or scheduler can choose (if the mode is feasible) the amount of resource he is willing to invest or sacrifice in order to comply with the established due date. Another characteristic is the inclusion of non-renewable resources, along with the renewable resources already taken into account in the single mode RCPSP. The non-renewable resources are those whose total amount is limited over the project duration and the exhausted amount cannot be replenished, such as capital budget. When non-renewable resources are present in the project the problem becomes NP-complete [7]. Please refer to Talbot [8] for the details on the mathematical formulation of the MRCPSP with all the constraints. Due to its complexity MRCPSP includes time/resource and resource/resource trade-offs for all resources types. De Reyck et al. [9] introduced the discrete time/resource trade off problem (DTRTP), which exemplifies the case that activities can be performed with different amounts of resources, resulting in different possible durations. Pollack-Johnson and Liberatore [10] studied discrepancies in quality between activity modes of DTRTP. Ranjbar et al. [11] extended a generalization of DTRTP with multiple resource types (MDTRTP). Such problem involves each renewable resource with time/resource trade off. More researches regarding MRCPSP in the last decades can be found on Özdamar et al. [12], Pesch [13], Hartmann [14], Jósefowska et al. [15], Alcaraz et al. [16], Bouleiman and Lecocq [17],

Entropy 2014, 16

5035

and Jarboui et al. [18]. Nudtasomboon and Randhawa [19] allowed pre-emption of activities in a multi-mode RCPSP. Salewski et al. [20] and Drexl et al. [21] extended the MRCPSP by introducing mode identity constraints, in which there are some activities that should be performed in the same way, e.g., by allocating the same resources to them. Erenguc et al. [22] introduced the crashable modes, where the duration of a mode can be shortened at the expense of an additional cost. This is a special case of the mode concept and has been a rather common practice among project managers when the project is running behind schedule. Bellenguez and Néron [23] considered activities which require staff members with certain skill levels. Zhu et al. [24] employed a multi-mode problem with generalized resource constraints. Varma et al. [25] considered a multi-mode problem without nonrenewable resources. Multi-mode problems with generalized precedence constraints have been considered by De Reyck and Herroelen [26], Drexl et al. [21], Heilmann [27,28], Nonobe and Ibaraki [29], Brucker and Knust [30], Calhoun et al. [31], Sabzehparvar and Seyed-Hosseini [32] and Barrios et al. [33]. Furthermore, examples of quality considerations in MRCPSP can be found in: Tareghian and Taheri [34] whom employed the mode concept to consider quality but, their objective is to maximize the quality while the project’s deadline and budget (non-renewable resource capacity) must be observed. Also, Li and Womer [35] employed the mode concept to take quality considerations into account and whose goal is to find the reliability of a node in the supply chain. Tiwari et al. [36] proposed a model in which an activity may be started in a mode that does not allow completing the activity at a required quality level. Processing in such a mode then has to be followed by a rework mode that completes the activity. 2.1.2. Objectives Solved Throughout decades, researchers have proposed many ways to tackle the MRCPSP using models that optimize different objectives. The objectives or performance indicators for projects can be divided in two broad categories: time performance indicators and financial evaluation indicators. However, these models usually do not take into account managing uncertainty in the projects, and if any disruption occurs, these deterministic schedules do not consider the proper idle times to improve flexibility and robustness [37]. 2.1.2.1. Time Performance Indicators Even though the most researched objective in MRCPSP is the minimization of makespan [38], objectives based on lateness, tardiness, and earliness have also been closely studied. Lateness (Lj) is the deviation of an activity’s completion time (Cj) from a given due date (dj), (Cj−dj), either a positive or negative value. Tardiness can be simply defined as the positive values of lateness, including 0 (Tj= max{0, Cj−dj}), while the earliness would be the range of the absolute value of the negative values of lateness up to 0 (Ej = max{0, dj−Cj}). Franck and Schwindt [39] mentioned an MRCPSP with the objective of minimizing the sum of the earliness and tardiness values. Vanhoucke et al. [40] discussed a just-in-time objective which is achieved by minimizing the weighted sum of all earliness and tardiness values. Neumann et al. [41] studied the minimization of the maximum lateness and of the weighted total tardiness. An alternative

Entropy 2014, 16

5036

objective minimizes the maximum value of all earliness and tardiness values. Lorenzoni et al. [42] proposed a variant where earliness and tardiness are measured with respect to a given time window in which an activity should be carried out. Nudtasomboon and Randhawa [19], Kolisch [43], Viana and de Sousa [44], and Ballestín et al. [45], considered the minimization of the weighted tardiness, which generalizes the makespan objective. Nudtasomboon and Randhawa [19] proposed to minimize the sum of all activity completion times, while Rom et al. [46] minimized the weighted sum of the completion times. Similarly, Nazareth et al. [47] suggested minimizing the mean flow time, which is the average of all activity completion times. Vanhoucke [48] defined a set of time windows for each activity carrying out an activity within one of its time windows is desired due to quality considerations. The objective function minimizes penalties that are caused by executing activities outside their time windows. 2.1.2.2. Financial Indicators Maniezzo and Mingozzi [49] and Möhring et al. [50,51] considered costs for each activity dependent on the activity’s start time and their objective is to minimize the sum of these costs. Achuthan and Hardjawidjaja [52] minimized total project costs which consist of earliness and tardiness costs with regard to due dates as well as costs related to the durations of the activities. Dodin and Elimam [53] aimed at minimizing costs which include costs for activity crashing (shortening the duration by increasing the resources assigned to it), material costs and inventory holding costs. Nonobe and Ibaraki [54] considered activity durations which have to be between a lower and an upper limit. This leads to an objective that minimizes the costs related to the durations. Recent papers considering the objective to maximize the net present value include Kimms [55], Vanhoucke et al. [56], Mika et al. [57] and Padman and Zhu [58]. NPV is considered when cash inflows and outflows occur while the project is carried out. Icmeli-Tuckel and Rom [59] employed the NPV objective in a problem with continuous activity durations and time-dependent resource capacities. More examples of NPV maximization in MRCPSP can be found in Ulusoy et al. [60], Varma et al. [25], and Waligóra [61]. Chen and Chyu [62] maximized NPV by using a hybrid of branch-and-bound and memetic algorithm. Variants of the NPV objective can be found on: Icmeli-Tuckel and Erenguc [63] pointed out that the cash flow associated with activity j might depend on the mode chosen for j. Etgar et al. [64] whom instead of fixed cash flows, considered individual cash flow functions of the completion time for each activity. Vanhoucke et al. [65] assumed the cash flow of an activity to be a linear non-increasing function of the activity’s completion time. In [66], at specific time periods cash inflows related to activity i occur and they are proportional to the fraction of i being completed at that moment. Najafi and Niaki [67] considered a cash flow that is initiated when the last activity of the subset is finished. Some authors have extended the NPV objective by additional payments upon project completion. Icmeli-Tuckel and Erenguc [68] as well as Özdamar et al. [12] considered a penalty being charged for each period the project is finished after a given due date. Chiu and Tsai [69], Doersch and Patterson [70], and Sung and Lim [71] extended this by including also bonus payments for early completion. Ulusoy and Cebelli [72] investigated the negotiation process to find the timing of payments and the amount of each specific payment between a client (who seeks to minimize its NPV) and a contractor (seeks to

Entropy 2014, 16

5037

maximize NPV). Dayanand and Padman [73] treated a similar problem but restricted themselves to the client’s point of view. 2.1.3. Solution Procedures Throughout many years of research, many solution procedures have been developed to try to optimally solve the scheduling problem (especially to minimize the makespan) while satisfying all of its conditions and constraints. These solution procedures include both meta-heuristic algorithms such as: Genetic Algorithm (GA), Simulated Annealing (SA) and Tabu Search (TS); as well as exact procedures like enumeration and Branch-and-Bound (B&B). Here we review some of the most popular methods used. 2.1.3.1. Exact Procedures Solving MRCPSP using an exact procedure implies that the problem will be solved to optimality; nonetheless, they are always limited in terms of the problem size due to the NP nature of the problem. Optimal procedures include: dynamic programming, 0–1 programming, graph representation approaches, and implicit enumeration with branch-and-bound. In this review, the focus will be on branch-and-bound algorithms, because of their popularity and widely accepted efficiency and effectiveness. A variety of branch-and-bound procedures have been proposed for solving RCPSPs and its variations to optimality since Land and Doig [74], where large subsets of fruitless candidates are discarded as a group, by using upper and lower estimated bounds of the quantity being optimized. Another example of a B&B method was to use certain enhancements to solve an Assignment Problem with Side Constraints (APSC) [75]. Various B&B algorithms have been developed, and among them we can find: Stinson et al. [76], Christofides et al. [77], Demeulemeester and Herroelen [78,79], Sprecher et al. [80], and Mingozzi et al. [81]. Three of the most competitive exact algorithms for MRCPSP, also derivate from the B&B algorithm: The precedence tree algorithm, first introduced by Patterson et al. [82]. Later, Sprecher and Drexl [83] reconstructed the algorithm to be more efficient by including some bounding criteria. The mode and delay alternative procedure is a branch-and-bound approach proposed by Sprecher et al. [84], an extension of the concept of delay alternatives used by Christofides et al. [77] and Demeulemeester and Herroelen [78] for the single mode RCPSP. The mode and extension alternative was developed by Hartmann and Drexl [14] and adopts the concept of mode alternatives developed by Sprecher et al. [84] but uses a different way to extend partial schedules based on a method proposed by Stinson et al. [76]. However, all of the exact methods have found limitations when trying to generalize their implementation to other instances as they are very instance specific and generally can’t handle increasing problem sizes; therefore, meta-heuristics become dominant in solving RCPSP. 2.1.3.2. Meta-heuristics Known for their capabilities and accessibility, several meta-heuristics such as Tabu Search, Simulated Annealing, and Genetic Algorithm, are some of many early recognized methods. De Reyck et al. [9] presented several heuristic procedures for the DTRTP based on local search and Tabu Search.

Entropy 2014, 16

5038

Hartmann [85] developed a Genetic Algorithm to solve MRCPSP, in which single pass and multi pass local search components were adopted as local search to improve schedules. Józefowska et al. [15] proposed a Simulated Annealing algorithm to solve the MRCPSP, in which two versions of SA were discussed: SA without penalty function and SA with penalty function. Bouleimen and Lecocq [17] also proposed SA for MRCPSP, but the approach used was to use two embedded search loops alternating activity and mode neighborhood exploration to improve the search. As the progress of meta-heuristics continues, several other algorithms have sprouted out over recent years; for instance, there are Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Scatter Search (SS), Differential Evolution (DE), and Artificial Immune System (AIS), etc. Zhang et al. [86] proposed a Particle Swarm Optimization, adopting a procedure checking and adjusting infeasible particle (represented solutions) and transforming infeasible solutions into feasible ones. Jarboui et al. [18] also presented a PSO approach but combinatorial, in which he adopted a unique local search procedure with a unique solution encoding and representation. Damak et al. [87] proposed a DE approach to solve the MRCPSP, and analyzed the effect of population size on the solution quality. The Van Peteghem and Vanhoucke [88] approach used Artificial Immune System (proposed by De Castro and Timmis [89]) to solve the MRCPSP. Carazo et al. [90] solved project portfolio selection and scheduling problem using TS and SS. And recently Wang and Fang [91] used Estimation of Distribution Algorithm (EDA) to solve MRCPSP with the criterion to minimize makespan. Some of the hybrid forms of implementation include: Ranjbar et al. [11] developed a hybrid heuristic procedure using scatter search algorithm with path re-linking methodology to solve the discrete time/resource trade-off problem MDTRTP. Shi et al. [92] proposed a hybrid Ant Colony Optimization and Scatter Search (ACOSS) to solve RCPSP in real time. 2.2. Uncertainty in Project Management There are many sources of uncertainty, both internal and external, in project scheduling. These begin from process uncertainties involving measurable data all the way to external uncertainties coming from environmental conditions, technology changes and market parameters. Some of the most common sources of uncertainty are variable operation times and resource availability, and their effects that impact the tasks scheduled in the form of idle and waiting times. Waiting times eventually result in completion time delay while idle times may result in resource under-utilization. Uncertainty may cause that numerous disruptions arise at the time of executing a schedule. Consequently, the actual schedule executed will probably differ from the baseline estimated in the planning stages. A detailed consideration of uncertainty is required in order to have an effective scheduling. This consideration leads to increase the schedule’s flexibility, and this flexibility is usually the result of adding buffer times. 2.2.1. Buffer Time Generation Regardless of the literature found with respect to buffer time generation in project management, in practice this is done based on the experience of the scheduler rather than in a scientific and methodical manner. Following are the references to some of the literature regarding time buffer generation in projects.

Entropy 2014, 16

5039

Gao [93] introduced the temporal protection which extends the duration of activities based on the uncertainty statistics of the resources that are used for their execution. Davenport et al. [94] proposed improvements of this temporal protection technique with their time window slack and focused time window slack approaches in which they do not include slack into activity durations, but explicitly compute available slack time per activity in solution schedules. In this way, they are able to utilize the same slack time for protecting more than activity, and concentrate slack in areas of the schedule that are most important or most vulnerable. Mehta and Uzsoy [95,96] inserted additional idle time into the predictive schedule to absorb the impact of machine breakdowns. Herroelen and Leus [97] that discussed about Critical Chain Scheduling and Buffer Management (CC/BM), considered as the most important breakthrough in the history of project management and which recommended a project buffer of half the project duration or half the duration of the longest non-critical chain path leading into it. Other methods can be found in [98,99]. More recent methods can be found on Van de Vonder et al. [100], where the resource flow dependent float factor (RFDFF) was proposed as an extension to the adapted float factor (ADFF) heuristic proposed by [101,102]. RFDFF starts from an un-buffered schedule and modifies it by adding safety buffers in front of activities. The hope is that the time buffers serve as a cushion to prohibit the propagation of the disruptions through the schedule. More recently Van de Vonder et al. [103] proposed two new time buffer generation algorithms: First, the Virtual Activity Duration Extension (VADE) heuristic, which relies on the variability in the activity durations of the predecessors of an activity to decide on the need for a time buffer; second, the Starting Time Criticality heuristic (STC), which exploits information about both the weights of the activities and the variance of the activity durations. The basic idea is to start from an initial un-buffered schedule and iteratively create intermediate schedules by adding a one-unit time buffer in front of that activity that needs it the most in the current intermediate schedule, until adding more safety would no longer improve the schedule’s stability. The latest paper found regarding time buffer generation is from Nazarian and Ko [104], where they present models that generate buffer times in order to design robust manufacturing lines. 2.2.2. Entropy as a Measure of Uncertainty Many methods have been used to deal with uncertainty in diverse research fields. Some of those methods include: Fuzzy Logic, Bounded Uncertainty, Constraint Propagation Stochastic Modeling and Entropy. Entropy is a basic concept in thermodynamics, which expresses the uniformity of energy distribution or the disordered degree of particles in system. The advantage of entropy functions over the others mentioned is that unlike the other methods, entropy is capable of providing a more exact measure for uncertainty. Shannon [105] introduced it into the scope of information theory and here it refers to the measure of the uncertainty in a random variable. Even though the concept itself has been around for over 50 years, very few research has been made on the application of entropy to project management. In fact, after an extensive search only two references could be found applying the concept of entropy to the project management domain. Bushuyev and Sochnev [106] used it as a unified measure of uncertainty that compares various types

Entropy 2014, 16

5040

and sources of risk in projects. Sun et al. [107] combined it with Analytic Network Process (ANP) in order to quantify and rank risk sources provided by a panel of construction experts. The formula that Shannon defined for entropy in the information theory goes as follows: ln

(1)

where pi corresponds to the probability of occurrence of some state or event, and the sum is extended over the set of all states or events. However, in practice, in very rare cases this probability distribution curve is known. Nonetheless, an estimation that we can make is one regarding the duration of the activity i, di, and we can define a range dil < di < diu where dil is the activity’s shortest possible duration, di is its most probable duration and diu is its worst or longest possible duration. Based on this range for the activity duration, Bushuyev and Sochnev [106] used Shannon’s formula to measure the entropy of both single activities on formula (2) and complete projects on formula (3). Here, Ei represents the set of unfavorable events for activity i or the time between and as shown in Figure 1. The term δt is defined as a relevant time interval, and it is dependent on the nature of the project; we define it as checkpoints for the project, not necessarily milestones. The riskier the project, or the more unstable the environment in which we develop it, the more frequent checkpoints need to be established. This way, the project manager has more current information at hand and can take decisions faster (reduce the entropy) to re-gain control of the project in case of the occurrence of an incident that may affect it. For a project manager, the concept of entropy is related to the control of the project: mitigate the impact of negative events in order to keep the scope of the project and its expected outcome as intact as possible. In practice, one of the most common ways in which control is exerted is by setting checkpoints which are different from milestones. At each checkpoint, usually in the form of meetings, the project manager receives updated information about the status of the project and with this information he takes decision to keep it as close as possible to its baseline. Every time a checkpoint is reached, the project’s entropy decreases because there is current information about which activities have been completed, the work in progress, and what is still un-started. With every decision taken by the project manager, the options available as to how to get to the next checkpoint decrease thus reducing uncertainty. In order to determine the entropy of an activity first we need to determine the set of unfavorable events as shown in formula (4) where si refers to the slack of the activity i: ln

(2) (3) (4)

Figure 1 gives a graphical representation of the set of unfavorable events, and the relevant time interval. In this figure, the top bar (in grey) represents an activity scheduled with the most probable duration di, and so, the slack, si is the time interval between and . The bottom bar (in white) shows the with the shortest possible duration dil and the with the worst possible

Entropy 2014, 16

5041

duration diu. As shown in the figure, Ei is the time between

and

and the parameter δt is

defined by the user. Figure 1. Graphical representation of the set of unfavorable events and relevant time interval, Ei and δt respectively.

si δt

Ei It is important to notice that an activity’s entropy does not depend on its execution mode but rather on the range of the estimation of its duration. This means that the higher the difference between and , the higher the scheduler considers the activity’s uncertainty and therefore, the higher the value of its entropy. On the other hand, the level of entropy of the schedule is directly affected by the modes selected. This is because, as we will detail in Section 3, we use Activity Priority Rules (APR) that determine the order in which activities are scheduled based on a priority value. This priority value depends either on the resource consumption or the duration of the activity and these values depend on the mode in which the activity will be executed. The activity to be scheduled next is chosen based on the rule selected and whether the priority value is the largest or smallest and therefore the schedule’s entropy is determined after a complete optimized schedule has been generated. 2.3. Robustness In an effort to close the gap between the knowledge generated in academia and the real world practices in project management, Icmeli-Tuckel and Rom [108] conducted a 22-question survey among project managers from different industries in the United States of America. One of the most significant findings of this survey is that “when quality is the most important scheduling objective, delays in project completion occur less frequently.” In their analysis, Icmeli-Tuckel and Rom [109] defined that “the quality of a project is measured by the amount of time and money spent on reworking the activities that do not satisfy (customer) specifications.” Using the aforementioned study as a reference, the term “schedule robustness” was introduced by Al-Fawzan and Haouari [110]. They defined it as “the ability (of a schedule) to cope with small increases in the time duration of some activities that may result from incontrollable factors.” The authors proposed the total sum of the free slacks as the measure of robustness and presented a biobjective model that maximizes robustness along with minimization of makespan. Kobyalanksy and Kutcha [111] proposed a modification on the mentioned model and established that a robust schedule is that which maximizes the free slack/activity duration ratio. Chtourou and Haouari [112] proposed 12 different robustness measures based on activity slack. Lambrechts et al. [113] defined a model based on weights and a free slack utility function for each activity.

Entropy 2014, 16

5042

Chtourou and Haouari [112] proposed a slack-based model to maximize a schedule’s robustness applied to the single mode RCPSP. The authors introduced 12 different robustness measures divided into three groups. Every group defines four different models, with the first model being the simplest because it only considers one value and the fourth of each group being the most sensitive taking into account the number of immediate successors and resource requirement weights. The main difference between each group is the value they use for the slack, i.e., Group 1 takes into account the complete value of the slack in their models, which could result in a bias if the slack is too large; Group 2 replaces the slack value for a binary variable which equals to 1 if there is slack or 0 if no slack is available; and Group 3, out of which RM12 originates, uses the minimum between the slack value and a fraction of the activity’s duration. In the Group 3, the user has to define the value of frac, the portion of the activity’s duration to use when comparing to the slack. Extending the Chtourou and Haouari [112] model from RCPSP to the MRCPSP and subjecting it to the constraints presented in [8], the formulation to maximize the schedule’s robustness goes as follows:



,







(5)

where frac is a threshold (%) of activity duration (0 < frac < 1), Nsucci denotes the number of immediate successors of activity i, and sim represents the slack of activity i if executed in mode m. Equation (5) establishes that our objective is to maximize the robustness measure, which is based on the slack of each activity in each available mode. The slack sim is calculated by sim = LSTim−ESTim, where ESTim (LSTim) is the earliest (latest) start time of activity i as determined by the standard forward (backward) recursion procedure [114]. The latest start time, LSTim, of every activity is defined as the latest time at which activity i could start without delaying any of its successors earliest start time. Section 3 will give a detailed explanation on the approach to produce the robusted schedules; for now however, we will only specify that these robusted schedules are generated after an initial schedule has been optimized and an entropy-based upper bound has been determined. As seen from this literature review, on the last decades many researchers have proposed a wide variety of models, algorithms and procedures in order to help generate schedules that resemble project management under real life circumstances. Nonetheless, to the best of our knowledge, quality measures in conjunction with the use of entropy function to generate such baseline schedules have not been yet developed for the MRCPSP. 3. Methodology The procedure begins by extracting a set of instances for of each benchmark set and determining their feasibility. In MRCPSP, an infeasible instance is that in which even when using the least resource consuming modes the total amount of non-renewable source required exceed the availability. An infeasible solution refers to a schedule with a combination of modes whose consumption of nonrenewable resources is greater than the amount available and/or whose total completion time is greater than the target time required. This procedures cycle until a feasible variation is selected. Once a feasible variation is selected, the process to generate robust base-line schedules consists of three stages. In stage I a lower bound or minimized makespan schedule is generated by using Artificial

Entropy 2014, 16

5043

Bee Colony (ABC), a powerful meta-heuristic. In stage II, an entropy-based makespan upper bound is generated using the schedule from stage I as an input. Finally, in stage III, we use ABC again but now to generate schedules with maximized robustness and with a makespan at most as high as the upper bound generated previously. Following is a short pseudo-code for the implementation of the method: Repeat until feasible Randomly pick benchmark instance If feasible then Stage I: Generate a schedule with minimized makespan (makespanI) Stage II: Calculate Stage I-schedule’s entropy (makespanII) Stage III: Generate schedule with maximized robustness (makespanIII ≤ makespanII) End End 3.1. Artificial Bee Colony Artificial bee colony is a rather newly developed optimization tool based on the intelligent foraging behavior of honey bee swarm [115–119], and composes several distinct features, e.g., scalability, fault tolerance, adaptation, speed, modularity, autonomy, and parallelism [120], which makes it a potential tool for optimization problems. The main idea of ABC algorithms follows that individual bees are part of a society and have an opinion which is part of a search space shared by every bee. Generally, three groups of bees are considered in the colony. They are employed bees, onlookers and scouts. In ABC framework, it is assumed to have only one artificial employed bee for each food source. The position of a food source corresponds to a possible solution in the problem’s solution space and the nectar amount of a food source denotes the quality of the associated solution. Each cycle in ABC consists of three different steps: sending the employed bee onto their food sources and evaluating their nectar amounts; after sharing the nectar information of food sources, the selection of food sources regions by the onlookers and evaluating the nectar amount of the food sources; determining the scout bees and then sending them randomly onto possible new food sources. In general, the procedure for the ABC algorithm for continuous problems can be described as follows:  The initialization phase: The initial solutions are n-dimensional real vectors generated randomly.  The employed bee phase: Each employed bee is associated with a solution and they apply a random modification (local search) on the solution (assigned food source) to find a new solution (new food source). Once the new food source is obtained, it will be evaluated and compared to the previous. If the fitness of the new solution is better than the previous, the bee will forget the old food source and memorize the new one. Otherwise, she will keep applying modifications until the abandonment criterion is reached.  The onlooker bee phase: When all employed bees have completed their local search, they share the nectar information of their food source with the onlookers, each of whom will then select a food source in a probabilistic manner. The probability by which an onlooker bee will choose a food source is calculated by:

Entropy 2014, 16

5044



(6)

where pi is the probability by which an onlooker chooses a food source i, SN is the total number of food sources, and fi is the fitness value of the food source i. The onlooker bees tend to choose the food sources with better fitness value (higher amount of nectar).  The scout bee phase: If the quality of a solution can’t be improved after a predetermined number of trials (abandonment limit), the food source is abandoned, and the corresponding employed bee becomes a scout. This scout will then produce a randomly generated food source. All these steps are repeated through a maximum number of cycles (MNC) determined by the user, or until another termination criterion is satisfied. Figure 2 presents a flow chart for implementing the ABC algorithm: Figure 2. Artificial Bee Colony Algorithm Flowchart.

ABC algorithm was developed to solve continuous functions and therefore, certain modifications must be made in order to apply it to combinatorial problem such as scheduling. In broad strokes, the most significant adaptations made to ABC in order to solve the MRCPSP are as follow: First, everything within the coding is represented in a matrix form. All the activity lists, schedules and all the information related to the benchmark instance is stored as matrices and/or groups of matrices. The second and most important is the modification of the local search, which consists of two operators: swap and insert or both. Refer to Figure 3a,b, where the top row (1,2,4,…, I) represents the identification of activity i, and the bottom row (1,2,3,…,1) represents the mode in which each activity will be executed. Now, supposed we randomly select activity 5 and activity 9 of solution x (Figure 3a)

Entropy 2014, 16

5045

to swap their modes. If this is the case, then activity 5 will be executed in mode 3 instead of mode 2, and activity 9 will now be executed in mode 2, but they will remain in the same order in the schedule, and all other activities will remain with their modes unchanged. If operator insert (Figure 3b) is chosen instead, with the same activities involved (insert mode of activity 9 in 5), then activity 5 will now be executed in mode 3, but this will also change the mode in which the activities between the two activities involved are executed. So, in this example, activity 7 will now be executed in mode 2, activity 11 using mode 2, and activity 9 in mode 1. If mixed operator, swap & insert, is chosen then both of this operators will be executed one after the other. Figure 3. (a) Example of swap operator; (b) example of insert operator. Activity list for Solution x

1 1

2 2

4 3

5 2

7 2

11 1

9 3

   …   …

      I 1

Activity list for Solution x

1 1

2 2

4 3

5 2

7 2

11 1

9 3

   …   …

      I 1

New activity list for solution x

1 1

2 2

4 3

5 3

7 2

11 1

9 2

   …   …

      I 1

New activity list for solution x

1 1

2 2

4 3

5 3

7 2

11 2

9 1

   …   …

      I 1

(a)

(b)

These operators, however, are not restricted to the mode execution; activities can also be swapped and/or inserted. The difference is that if activities are selected for swap/insert, an internal procedure will schedule them until all their predecessors have been scheduled. So, for example take again activities 5 and 9 selected for a swap but activity 5 is the only predecessor for activity 9. If this is the case, the activity list would follow the order: 1, 2, 4, 7, 11, 5, 9,…, I. Using the operators on both modes and activities helps to extend the solution search space and therefore increases the possibility of finding better solutions. 3.2. Three-Stage Procedure Before beginning the three-stage procedure, the instance’s information is extracted and its feasibility is evaluated. If feasible then the three-stage procedure will run until the termination criterion is met, otherwise it will continue to randomly select instances until a feasible one is selected. 3.2.1. Stage I—Initial Minimized Makespan Schedule Part of the complexity in solving the MRCPSP relies in selecting one out of the amount of modes available. In practice, however, we can’t just experiment with all the modes available. We need to select one of the modes available for every activity, preferably based on some kind of rule or parameters which could hopefully optimize either duration, resource consumption or both. In stage I, we generate a population number of initial solutions (schedules) and at least five of these initial solutions are based on modes selected by using Mode Selection Rules. The modes selected for the remaining initial schedules (if more than five) are determined randomly.

Entropy 2014, 16

5046

3.2.1.1. Mode Selection Rules At least five of the initial schedules are made with modes selected by using the Mode Selection Rules presented in Table 1. Shortest Feasible Mode (SFM) and Least Resources proportion were taken from Boctor [121]; the remaining three rules were taken from Chen and Chyu [122]. The mode selection rule to be used is chosen randomly and based on this selection the information of the mode is used to determine the activity list, resource consumption and ultimately, the makespan of the schedule. If population is greater than five then the remaining schedules are made with mode combinations (population–5) determined randomly. The mode combinations found using the MSR could be feasible or infeasible; nonetheless, they are kept in the rest of the procedure because they could become feasible with the local search. On the other hand, all the mode combinations determined randomly always begin as feasible solutions. Table 1. Mode Selection Rules. Priority Rule SFM—Shortest Feasible Mode

LRP—Least Resource Proportion

LPSRD—Least Product Sum of Resource and Duration

LTRU—Least Total Resource Usage

LRS—Least Sum of Nonrenewable Resource

Description Find the feasible mode combination for which the makespan is minimal Choose the mode which leads to the smallest value of the criterion, max(

) ∀

where

stands for the requirement of renewable

resource type k per period by activity i executed in mode m. Kρ= total number of renewable resource types in the project. For each activity, choose the execution mode which has the minimum product sum of non-renewable resource usage and its corresponding mode duration, min ∑ ∗ ∀ . Choose the execution mode which requires the least total non-renewable usage, min ∑ ∀ where represents the requirement of non-renewable resource type k per period by activity i executed in mode m. Kv represents the total number of non-renewable resource types in the project. Choose the execution mode which requires the least sum of the ratio of the non-renewable consumption to its corresponding resource limitation, min ∑



. Here,

stands forthe amount of non-renewable

resource type k available per period.

Once the execution modes are selected, either by using the MSR or randomly, the next step is to determine the activity lists that will be used in the generation of the initial schedules. The order in which activities are to be scheduled is determined by rules, more specifically Activity Priority Rules. 3.2.1.2. Activity Priority Rules To establish the order in which every activity will be executed, a priority value derived from the activity priority rules is calculated. The activity to be scheduled next is chosen based on the rule selected and whether the priority value is the largest or smallest. The priority rule used for every solution is selected randomly and they can be found in Table 2:

Entropy 2014, 16

5047 Table 2. Activity Priority Rules.

Priority Rule

References

max ACTIM

[123–125]

max GCUMRD

[126]

max MTS max MIS

[127] [127]

Description = CPM – LSTi where CPM stands for the duration of the Critical Path while LST represents the Latest Start Time of activity i. The sum of the renewable resource demand of the activity considered and the renewable resource demands of all its immediate successors. | | the total number of successors for activity i. | | the number of immediate successors for activity i. ∑

max ROT

[128]

sum of the ratio of the renewable resource requirement over the resource availability divided by the activity duration for activity i ∑

max WRUP

[129]

min EFT min LFT min SLK

[130] [130] [130]

min LNRJ

[126]

min RSM

[131]

0.7 ∗ | |

0.3 ∗

, a weighted sum of the

number of immediate successors and an average resource use over all renewable resource types. EFTi Earliest finish time of activity i. LFTi Latest finish time of activity i. LFTi – EFTi | | the total number of activities that are not precedence related with activity i dij = max[0, (EFTi – LSTj)]

3.2.1.3. Initial Schedule Generation and Optimization The final step required within the Initialization Phase of the ABC algorithm is to generate the initial schedules. In this three-stage procedure the schedules are generated using a Serial Generation Scheme (SGS). This means that only one activity is considered at each time and the scheduling order will follow the order provided by the activity list which already considers the information about the activity’s predecessors. Each activity is assigned at the earliest feasible start time. When all the initial schedules are generated within the initialization phase of ABC, the two improvement phases take place, using the local search operators introduced in Section 3.1. In the Employed Bees Phase, all the solutions are selected for improvement. If a solution is not improved with the local search a counter for solution non-improvement will increase. If a solution is improved its counter will be restarted regardless of the number of non-improvements it had previously. If a solution reaches the abandonment limit for not being improved this solution will be marked for replacement when the Scouts Bees Phase is reached where a new solution will be generated. The Onlooker Bees Phase makes improvements to solutions based on the probability function described in (6). With higher solution fitness, the probability for it being selected for improvement is increased. Similar to the Employed Bees Phase, if the solution selected is not improved with the local search operators a counter for solution non-improvement will increase but it’s restarted if the solution

Entropy 2014, 16

5048

is improved. If a solution reaches the abandonment limit the solution is marked for replacement by a new solution. Scouts Bees Phase is the final stage in the ABC algorithm employed. In this stage, all the solutions that reached the abandonment limit are replaced by new solutions. This new solutions can be generated either by using the MSR detailed previously or randomly, the way in which they are determined is selected randomly. These three improvement phases are performed a maximum number of cycles times and when this criterion is reached, the schedule with the shortest makespan is reported as the lower bound for the three-stage procedure. 3.3. Stage II—Determining the Schedule’s Entropy The output for Stage I is a schedule with a minimized makespan which will serve as lower bound for the three-stage procedure. Stage II calculates the activities and schedule’s entropy and with this, a new and possibly—though not necessarily—higher makespan that will serve as an upper bound. The entropy value for each of the activities is calculated using formula (2) as shown in the following example. Suppose at the end of Stage I we obtain the schedule shown in Table 3a. Table 3b details the scheduler’s estimations for the activity’s shortest possible duration dil, the most probable duration di and the longest possible duration, diu. Furthermore, suppose that we are executing our project in a risky environment and therefore we establish daily checkpoints δt = 1. In order to complete the parameters to estimate the entropy we now have to estimate the slack for every activity, following the activity list from the optimized schedule and this is done with the standard forward and backward recursion procedure where EST (LST) is the Earliest (Latest) Start Time and EFT (LFT) is the Earliest (Latest) Finish Time, and is the Earliest Finish Time with the worst possible duration; the results are shown in Table 3c. After the entropy for each activity is calculated, this value is added to the activity’s current duration and with this a new Entropy Containing Schedule is developed as shown in Table 3d. Let’s take activity 5 as an example, refer to Table 3a. In Stage I, the mode selected for activity 5 determined that its duration will be of 7 time units. In Table 3b we notice that the scheduler determined that the shortest possible duration (dil) for activity 5 was of 7 time units, the most probable (di) was 9 and the longest possible duration (diu) was of 10 time units. We run the forward and backward procedure using the most probable duration and we find that activity 5 is part of the critical path for this schedule and therefore has slack si = 0. As mentioned previously, this project is being executed in a risky environment and therefore the project manager determines that daily checkpoints are necessary, δt = 1. The is determined by adding the difference between the worst (diu) and most probable (di) durations to the Earliest Finish Time with the most probable duration ( ), = + (diu−di) and for this case = 10. With Equation (4), we first determine that the set of unfavorable events (Eu) is 1 and using the ceiling function on Equation (2) to avoid fractions of time periods, we find that the entropy for activity 5, S5 = 1. To form the entropy containing schedule, we add the activity’s entropy values to its current duration and we determine using the same activity list as determined in Stage I we evaluate the new schedule. In our example, the new duration for activity 5 is of 8 time units and after evaluating all the activities, the new makespan for this schedule is 19 time units.

Entropy 2014, 16

5049

This entropy containing schedule will serve as an upper bound for the makespan in the third and final stage. Notice that even if an activity increases its duration this will not necessarily affect the total makespan of the schedule. For example, notice activity 9, in Stage I the duration was of 2 time units and its entropy increases its duration another 2 time units. Nonetheless, the schedule is only affected in 1 time unit because of the precedence relationships and the activity list determined previously. Table 3. Example for the Calculation of Activities and a Schedule’s Entropy. (a) Optimized Schedule from Stage I; (b) Range of Estimated Durations; (c) si, Eu, SID calculation; (d) Resulting Schedule for Stage II. Stage I ABC Schedule (Optimized Makespan) Activity Start Duration Finish 1 0 0 0 3 0 2 2 5 2 7 9 2 0 2 2 4 2 2 4 7 4 4 8 10 9 3 12 8 9 6 15 6 8 2 10 11 15 3 18 9 15 2 17 12 18 0 18

(a) Activity 1 3 5 2 4 7 10 8 6 11 9 12

Durations Estimation dil di 0 0 2 2 7 9 2 3 2 6 4 8 3 9 6 7 2 4 3 7 2 4 0 0

(b)

diu 0 8 10 5 7 9 9 7 10 8 10 0

Entropy 2014, 16

5050 Table 3. Cont. Slack, Unfavorable Events and Entropy Calculation

Activity 1 3 5 2 4 7 10 8 6 11 9 12

EST 0 0 0 0 9 9 3 15 22 15 22 26

EFT 0 2 9 3 15 17 12 22 26 22 26 26

LST 0 17 0 3 9 14 6 15 22 19 22 26

LFT 0 19 9 6 15 22 15 22 26 26 26 26

Slack 0 17 0 3 0 5 3 0 0 4 0 0

0 8 10 5 16 18 12 22 32 23 32 26

Eu 0 0 1 0 1 0 0 0 6 0 6 0

SID 0 0 1 0 1 0 0 0 2 0 2 0

(c) Stage II Entropy Containing Schedule (Upper-bound Makespan)

Activity 1 3 5 2 4 7 10 8 6 11 9 12

Start 0 0 2 0 2 6 10 10 10 16 16 19

Duration 0 2 8 2 3 4 3 6 4 3 4 0

Finish 0 2 10 2 6 10 14 16 13 19 19 19

(d) 3.4. Stage III—Final Robusted Schedule To produce the robusted schedules, we solve the same model introduced by Talbot [8] and presented in Section 3.1. These robusted schedules, however, instead of minimizing the makespan seek to maximize the robustness while keeping the makespan in a range defined by the boundaries determined in Stage I and Stage II. Recall that Stage I produces a lower bound schedule with minimized makespan (which is not necessarily the lowest makespan the robusted schedule can achieve) while Stage II produces an upper bound makespan by generating an entropy containing schedule. In Stage III, we apply the ABC algorithm again as used in Stage I, but there are 2 major differences:

Entropy 2014, 16

5051

 In the Initialization phase we keep generating schedules, until the initial population is complete. Contrary to the Initialization phase in Stage I in which the initial makespan of the schedule is irrelevant, in Stage III, only the schedules with initial makespan within the range defined previously are considered as part of the initial population, the rest are discarded.  The objective function in Stage III maximizes the robustness of the population using Equation (5). At the end of Stage III, the schedule reported will be one with maximized robustness and with a makespan usually ranging from the lower bound generated in Stage I and at most as high as the entropy containing schedule generated in Stage II. There are cases however, in which the makespan for the robusted schedule is even lower than the lower bound found in Stage I. If this happens, we evaluate if the robustness measure for the Stage III schedule is higher. If so, then this is reported as the result from Stage III. If the makespan is lower but the robustness measure is lower than the Stage I schedule then this schedule is discarded because what we are trying to offer are robust schedules rather than lower makespan. Let’s continue with our previous example to determine the robustness measure. Refer to Table 4. Tables 4(a,b) show the schedule reported in Stage I with Robustness Measure (RM) = 67.25 and Stage II with Robustness Measure = 93.5 respectively. To calculate this measure we need to define parameter frac (for this example it was set as 0.25) which stands for 25% of the duration of activity i in mode m. The robustness measure will take the minimum between the activity’s total slack and the value of (min (si, frac*di)) and later multiply it by the number of successors and resource used in mode m. Table 4c demonstrates four different schedules generated in the Initialization Phase for Stage III. Finally, Table 4d presents the schedule with maximized robustness that will be reported at the end of Stage III. Table 4. Example for the Calculation of Activities and a Schedule’s Entropy. (a) Optimized Makespan—Stage I; (b) Entropy Containing Schedule—Stage II; (c) Schedules generated during Initialization Phase in Stage III; (d) Final Robust Schedule generated in Stage III. Stage I ABC Schedule (Lower Bound)

Activity 1 3 5 2 4 7 10 8 6 11 9 12

Start 0 0 2 0 2 4 9 9 8 15 15 18

Duration 0 2 7 2 2 4 3 6 2 3 2 0

(a)

Finish 0 2 9 2 4 8 12 15 10 18 17 18

RM 67.25 67.25 67.25 67.25 67.25 67.25 67.25 67.25 67.25 67.25 67.25 67.25

Entropy 2014, 16

5052 Table 4. Cont. Stage II Entropy Containing Schedule (Upper Bound)

Activity 1 3 5 2 4 7 10 8 6 11 9 12

Start 0 0 2 0 2 6 10 10 10 16 16 19

Duration 0 2 8 2 3 4 3 6 4 3 4 0

Finish 0 2 10 2 6 10 14 16 13 19 19 19

RM 93.5 93.5 93.5 93.5 93.5 93.5 93.5 93.5 93.5 93.5 93.5 93.5

(b) Activity

Start

Duration

Finish

Activity

Start

Duration

Finish

1 4 3 6 5 7 8 9 11 2 10 12

0 0 0 2 2 4 9 15 15 8 10 18

0 2 2 2 7 4 6 2 3 2 3 0

0 2 2 4 9 8 15 17 18 10 13 18

1 3 5 2 6 4 7 10 8 11 9 12

0 0 2 0 2 4 6 9 10 16 16 19

0 2 7 2 2 2 4 3 6 3 2 0

0 2 9 2 4 6 10 12 16 19 18 19

1 2 3 5 4 6 7 10 8 9 11 12

0 0 0 2 2 4 6 9 10 16 16 19

0 2 2 7 2 2 4 3 6 2 3 0

0 2 2 9 4 6 10 12 16 18 19 19

1 3 2 6 5 4 10 7 8 9 11 12

0 0 0 2 2 4 9 6 10 16 16 19

0 2 2 2 7 2 3 4 6 2 3 0

0 2 2 4 9 6 12 10 16 18 19 19

(c)

Entropy 2014, 16

5053 Table 4. Cont. Stage III Robusted Schedule (FINAL)

Activity 1 4 3 6 5 7 8 9 11 2 10 12

Start 0 0 0 2 2 4 9 15 15 8 10 18

Duration 0 2 2 2 7 4 6 2 3 2 3 0

Finish 0 2 2 4 9 8 15 17 18 10 13 18

RM 93.5 93.5 93.5 93.5 93.5 93.5 93.5 93.5 93.5 93.5 93.5 93.5

(d) 4. Computational Results 4.1. Scope To evaluate the practicality of our approach we conducted experiments solving the test instances generated by the ProGen and collected in the PSPLIB [132]. In this benchmark, each set of instances contain 2 renewable and 2 non-renewable resources and the number of activities goes from 10, 12, 14, 16, 18, 20 and up to 30, being 30 activities the most complicated to solve. Every activity, except for the dummies (i = 1 and i = I), has 3 modes in which they can be executed. As the number of activities increases, the possible mode combinations increase exponentially, starting from 59,049 when the number of activities is 10 and rising up to 2.05891E+14 when working with 30 activities. Also, in an effort to solve larger instances, we used the MRCPSP/max benchmark set collected in [133]. The instances in these sets contain 50 or 100 activities respectively; use three renewable, three non-renewable and three doubly constrained resources; and every activity can be executed in at least three and in up to five different modes. However; there are significant differences regarding the constraints when compared to the MRCPSP we are solving for this paper. In order to sort through these differences and be able to use most of the information (number of activities, resources and some of the network structure) we had to pre-process the data and disconnect loops between successors and predecessors which are not considered in the original MRCPSP. Nonetheless, this process affects almost completely the way in which most of the activities are interconnected originally from beginning to end. This in turn affects the gap between solutions obtained with the ABC algorithm and the best known solutions because by changing the network, it’s essentially a different problem. And even though comparing solutions for what are basically different problems is unfair and not as promising as when compared when solving the original MRCPSP, we still compare against the MRCPSP/max best known solutions because these are our only objective point of reference and we also consider this could be the worst case scenario.

Entropy 2014, 16

5054

The experiments were very straight-forward, following the procedures described in Section 3 and the only additional information used were the parameters used to evaluate the formulas. The purpose of this study is to develop an approach that basically generates a lower and upper bound for a schedule’s makespan and ultimately generate a robust baseline schedule within these boundaries which is capable of absorbing variations caused by its inherent uncertainty. And even though our main objective was not to minimize the makespan, in most of the MRCPSP cases in the PSPLIB the bestknown solution was reached as the lower bound. Also, it is worth to mention that in practically every set of these instances at least one better solution was found. On the other hand, the results for the MRCPSP/max were not as promising as when solving the original MRCPSP and for these sets the best-known solution was not achieved for any of the instances solved. Again, we consider this is due to the pre-processing done and the change in the relationships between activities. 4.2. Description of the Procedure The first step in our procedure was to conduct a short sensitivity analysis where a total of five parameters, each with three different levels, were tested. At each test, only one specific parameter changed its level while the remaining four parameters were kept at their base level. The base levels were chosen empirically; however, their values are the strictest possible settings among the levels. This means that the higher levels were chosen for parameters that increase the search space or number of solutions evaluated (population size and MNC); while the lowest and most quality demanding levels were chosen for those parameters that are linked directly to the solution’s quality (abandonment limit, δt, frac). Table 5 shows the levels chosen to conduct the sensitivity analysis. Table 5. Parameters and levels for sensitivity analysis. Parameter Population size Abandonment limit MNC δt (relevant time interval) frac

Settings (* base level) 5 15 30* 5* 10 15 5 10 20* 1* 2 3 0.25* 0.50 0.75

The sensitivity analysis was performed on every set of benchmark instances. As an example, Table 6 shows the results of the sensitivity analysis when performed for one of the problem instances on j10. The values marked in grey represent the base level used for the sensitivity analysis. The deviation between makespan was determined by (Ms–M*)/M* where M* represents the optimal or best-known makespan and Ms denotes the makespan of the schedule against which it is being compared. When comparing the ABC against the entropy schedules and robust schedule, M* refers to the makespan achieved for the ABC schedule. The same analysis was performed on the rest of the benchmark sets and the results confirm our empirical choice for the base level settings. The best results (when comparing ABC Schedule vs. Optimal Makespan) are obtained when using higher levels on parameters that increase the search space and using the lowest levels for those parameters that are linked directly to the solution’s quality.

Entropy 2014, 16

5055

Table 6. Sensitivity Analysis Result for one problem instance of j10 benchmark set.

Population Size Abandonment Limit MNC δt (relevant time interval) Frac

MNC

δt (relevant time interval)

Frac

5 15 30 5 10 15 5 10 20 3 2 1 0.25 0.5 0.75

Deviation when compared to Optimal Makespan (%) ABC Entropy Robust Schedule Schedule Schedule 33.33 55.56 50.00 6.67 20.00 20.00 6.67 6.67 6.67 6.67 26.67 46.67 46.67 31.82 45.45 31.82 7.69 23.08 23.08 4.55 4.55 4.55 6.67 6.67 95.00 130.00 100.00 18.75 37.50 37.50 6.67 6.67 6.67 6.67 26.67 46.67 46.67 31.82 45.45 31.82

Deviation when compared to ABC Makespan (%) Entropy Robust Schedule Schedule 16.67 12.50 12.50 12.50 6.67 6.67 6.67 6.67 15.79 15.79 10.34 14.29 14.29 6.67 6.67 17.95 2.56 15.79 15.79 6.67 6.67 6.67 6.67 15.79 15.79 20.00 -

5

7.69

23.08

23.08

14.29

14.29

10

4.55

4.55

4.55

-

-

20

-

6.67

6.67

6.67

6.67

3

95.00

130.00

100.00

17.95

2.56

2

18.75

37.50

37.50

15.79

15.79

1

-

6.67

6.67

6.67

6.67

0.25

-

6.67

6.67

6.67

6.67

0.5

26.67

46.67

46.67

15.79

15.79

0.75

31.82

45.45

31.82

20.00

-

4.3. Results After determining the levels for the parameters (Population Size: 30, Abandonment Limit: 5, MNC: 20, δt: 1, frac: 0.25), we proceeded to run our experiments on every benchmark set. The algorithm cycles through the total problem instances available for each set, and randomly selects a predetermined number of feasible instances to be solved and compared against their best-known solutions. Even though in the case of MRCPSP/max we are essentially solving a different. Table 7 shows an example of the results obtained when evaluating the j10 benchmark set. The description of this table is as follows: Column BKO indicates the best-known solution for the problem instance; ABC, ENTROPY and ROBUST indicate the kind of schedule being compared against the BKO and under each of them we find the columns: MS which stands for makespan of that particular schedule, Dev which is the deviation of the schedule’s makespan when compared to BKO and RM which represents the

Entropy 2014, 16

5056

robustness measure obtained for the schedule. The numbers highlighted indicate that a solution better than the BKO was achieved either in the ABC schedule or in the robust schedule and therefore, the deviation is shown in parentheses to indicate a negative value. Recall that the ROBUST schedule is independent of the ABC schedule generated and the only hard restriction is that its makespan should be at most as high as the ENTROPY makespan. Similarly to the sensitivity analysis, this same table was generated for all the remaining benchmark sets and for each of them we evaluated if the deviation is statistically equal to 0 in case of the ABC schedule and if it’s statistically equal to 10 in the case of the Entropy and Robust Schedules. Table 7. Results for the evaluation of 40 problem instances for the j10 benchmark set. No.

Instance

BKO

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

j1020_3 j108_3 j1063_5 j1046_10 j1037_3 j1031_6 j104_9 j1055_1 j103_3 j1016_10 j1020_4 j1036_1 j1018_2 j1063_3 j1060_1 j1029_10 j1026_2 j1018_6 j1043_6 j1062_4 j107_5 j1029_10 j1028_10 j1014_2 j1010_6 j1036_5 j1044_9 j1023_8 j1018_3 j1034_4

21 17 12 20 29 20 21 18 19 26 17 32 15 17 13 28 12 15 16 15 24 28 18 19 18 23 17 18 17 23

ABC

ENTROPY

ROBUST

MS

Dev

RM

MS

Dev

RM

MS

Dev

RM

21.00 18.00 12.00 20.00 27.00 20.00 17.00 18.00 18.00 26.00 17.00 32.00 15.00 17.00 13.00 26.00 12.00 15.00 16.00 15.00 24.00 28.00 18.00 19.00 17.00 21.00 17.00 18.00 16.00 23.00

5.88 (6.90) (19.05) (5.26) (7.14) (5.56) (8.70) (5.88) -

44.50 39.75 20.00 64.25 73.00 40.00 32.50 80.00 39.50 39.00 28.00 82.50 21.75 73.25 21.00 31.00 23.50 28.00 32.50 69.50 39.00 40.50 60.25 41.50 28.75 73.50 62.50 40.00 38.00 41.00

21.00 26.00 15.00 24.00 29.00 21.00 23.00 21.00 19.00 27.00 17.00 36.00 17.00 20.00 15.00 28.00 14.00 16.00 21.00 15.00 26.00 30.00 22.00 21.00 18.00 24.00 21.00 20.00 18.00 25.00

52.94 25.00 20.00 5.00 9.52 16.67 3.85 12.50 13.33 17.65 15.38 16.67 6.67 31.25 8.33 7.14 22.22 10.53 4.35 23.53 11.11 5.88 8.70

49.25 67.50 105.75 101.50 80.50 55.50 37.00 87.00 47.25 42.50 30.00 93.75 31.50 79.00 62.75 33.00 34.00 30.50 32.50 73.50 44.25 59.75 72.00 79.75 32.25 80.50 66.00 46.75 40.00 42.75

21.00 18.00 12.00 20.00 26.00 20.00 17.00 19.00 18.00 26.00 17.00 32.00 15.00 18.00 13.00 27.00 11.00 15.00 16.00 15.00 25.00 27.00 22.00 19.00 14.00 15.00 17.00 18.00 16.00 23.00

5.88 (10.34) (19.05) 5.56 (5.26) 5.88 (3.57) (8.33) 4.17 (3.57) 22.22 (22.22) (34.78) (5.88) -

49.25 39.75 45.25 66.25 75.25 61.25 32.50 82.00 39.50 69.25 53.75 82.50 23.25 105.25 34.25 59.25 25.50 35.00 85.75 85.25 41.00 48.50 90.25 77.50 42.00 73.50 62.50 49.50 38.00 74.75

Entropy 2014, 16

5057 Table 7. Cont.

No.

Instance

BKO

31 32 33 34 35 36 37 38 39 40

j1026_4 j103_7 j1063_2 j1042_5 j1014_1 j1010_9 j1045_10 j1050_4 j1051_7 j1060_8

16 14 17 20 16 10 25 20 21 13

ABC

ENTROPY

ROBUST

MS

Dev

RM

MS

Dev

RM

MS

Dev

RM

16.00 14.00 17.00 21.00 17.00 10.00 26.00 19.00 21.00 13.00

5.00 6.25 4.00 (5.00) -

28.00 10.00 71.00 101.00 43.75 27.00 120.50 116.00 81.25 40.00

18.00 20.00 22.00 25.00 19.00 11.00 27.00 23.00 23.00 14.00

12.50 42.86 29.41 25.00 18.75 10.00 8.00 15.00 9.52 7.69

38.75 18.00 163.25 124.50 54.25 49.75 127.50 128.50 86.25 101.75

18.00 15.00 17.00 22.00 17.00 11.00 27.00 19.00 21.00 13.00

12.50 7.14 10.00 6.25 10.00 8.00 (5.00) -

38.75 27.50 135.50 120.25 90.25 49.75 141.75 140.75 81.25 40.00

When solving for the MRCPSP/max benchmark set we evaluate if the deviation is statistically equal to 25 in case of the ABC schedule and if it’s statistically equal to 35 in the case of the Entropy and Robust Schedules. When solving for the MRCPSP, the selection for the hypotheses values was based on values which are lower than the typical buffers used in practice. From previous field experience, a typical project buffer consists of adding (rather subjectively) a value of 10 and up to 20% of the estimated initial budget depending on the uncertainty under which the project is being executed. For this research, we wanted to prove that to objectively define a robust schedule is possible, and even a duration range is better than the values used in practice. Regarding the values for the MRCPSP/max, it would not be a fair comparison to use the same hypotheses values because as aforementioned, the problem has different constraints and the preprocessing of the data alters the expected performance of the algorithm. Table 8 summarizes the results achieved for all the benchmark sets. Here rows ABC, ENTROPY and ROBUST summarize the results achieved during Stage I, Stage II and Stage III, respectively, while the columns define the benchmark set in which the results were obtained. The row Avg. Dev. represents the Average Deviation obtained from the instances solved, Std. Dev. is the Standard Deviation of the average deviations, and Avg. RM stands for the Average Robustness of the 40 schedules. The number of solutions that were improved when compared to the BKO is registered in the row Improved BKO’s while row p-value is the criterion to evaluate our hypotheses. Furthermore, the rows 95% CI shows the lower and upper bound for the 95% confidence interval of the Avg. Dev estimation. In the ENTROPY and ROBUST sections, we have 2 extra rows that measure the increase in the average deviation and in the robustness with respect to the ABC schedule. ROBUST also includes a row that counts the times in which the robusted schedule is equal to either the ABC schedule or the Entropy schedule. Just as in Table 7, the negative values here are shown in parenthesis. Given the differences in the benchmark information and the significant differences in results, we will discuss the results for the MRCPSP and the MRCPSP/max separately. First, regarding the MRCPSP and based on the summary for columns j10–j30 presented in Table 8 we can make the following claims: we can conclude with a 95% of confidence that for the instances solved the Avg. Dev. when trying to minimize the makespan (Stage I—ABC schedule) will not exceed 8.66% in the worst case, and its upper bound will be around 4%, on average. With a 95% confidence the upper limit

Entropy 2014, 16

5058

for the Avg. Dev. on the Entropy schedule (Stage II) will be 22.68% in the worst case while 17% on average when compared to the BKO. Keep in mind, however, that the schedule for Stage II is based on Stage I, and so the increase in Avg. Dev. when compared to the ABC schedule is on average only 9.4% while the average increase on robustness is 25% and up to 33%. Table 8. Results for the evaluation of 40 problem instances for the MRCPSP and MRCPSP/max benchmark set. Summarized Results for Benchmark Evaluations

ROBUST

ENTROPY

ABC

Avg. Dev.

j10

j12

j14

j16

j18

j20

j30

mm50

mm100

(1.06)

0.41

3.43

3.36

2.12

5.78

9.61

24.72

32.94

Std. Dev.

4.31

4.89

7.99

8.55

5.46

8.89

12.39

7.50

11.54

Avg. RM.

49.68

71.93

107.51

121.25

134.01

154.83

251.03

840.56

963.99

Improved BKO's

8.00

11.00

7.00

7.00

4.00

4.00

-

-

-

p-value

0.13

0.60

0.01

0.02

0.02

0.00

0.73

0.07

0.04

95% CI. Lower Bound

(2.44)

(1.17)

0.84

0.59

0.35

2.91

(3.53)

10.13

18.31

95% CI. Upper Bound

0.32

2.00

6.02

6.13

3.89

8.66

2.50

29.20

60.59

Avg. Dev.

13.17

15.05

17.85

16.52

13.49

18.88

21.11

39.99

69.10

Inc. Avg. Dev. (x)

13.44

35.43

4.20

3.92

5.37

2.26

1.20

0.62

1.10

Std. Dev.

11.60

13.76

12.49

12.62

10.35

11.74

13.57

12.30

24.28

Avg. RM.

65.77

95.91

124.84

153.76

167.16

195.62

293.59

1,030.88

1,573.40

Inc. Avg. RM. (%)

32.40

33.34

16.12

26.81

24.73

26.35

16.96

22.64

40.32

p-value

0.10

0.03

0.00

0.00

0.04

Suggest Documents